Professional Documents
Culture Documents
Administering Oracle Analytics Publisher Oracle Transactional Business Intelligence
Administering Oracle Analytics Publisher Oracle Transactional Business Intelligence
F41282-02
March 2022
Oracle Applications Cloud Administering Publisher in Oracle Transactional Business Intelligence,
F41282-02
This software and related documentation are provided under a license agreement containing restrictions on
use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your
license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license,
transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse
engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is
prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If
you find any errors, please report them to us in writing.
If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on
behalf of the U.S. Government, then the following notice is applicable:
U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software,
any programs embedded, installed or activated on delivered hardware, and modifications of such programs)
and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end
users are "commercial computer software" or "commercial computer software documentation" pursuant to the
applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use,
reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or
adaptation of i) Oracle programs (including any operating system, integrated software, any programs
embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle
computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the
license contained in the applicable contract. The terms governing the U.S. Government’s use of Oracle cloud
services are defined by the applicable contract for such services. No other rights are granted to the U.S.
Government.
This software or hardware is developed for general use in a variety of information management applications.
It is not developed or intended for use in any inherently dangerous applications, including applications that
may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you
shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its
safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this
software or hardware in dangerous applications.
Oracle, Java, and MySQL are registered trademarks of Oracle and/or its affiliates. Other names may be
trademarks of their respective owners.
Intel and Intel Inside are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are
used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Epyc,
and the AMD logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered
trademark of The Open Group.
This software or hardware and documentation may provide access to or information about content, products,
and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly
disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise
set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be
responsible for any loss, costs, or damages incurred due to your access to or use of third-party content,
products, or services, except as set forth in an applicable agreement between you and Oracle.
Contents
Preface
Audience vii
Documentation Accessibility vii
Diversity and Inclusion vii
Related Resources vii
Conventions viii
iii
Grant Access to Data Sources Using the Security Region 3-1
About Proxy Authentication 3-2
About Pre Process Functions and Post Process Functions 3-2
Set Up a Connection to an HTTP Data Source 3-3
Set Up a Connection to a Content Server 3-4
Set Up a Connection to a Web Service 3-4
View or Update a Data Source 3-5
iv
All Outputs Properties 5-20
Memory Guard Properties 5-20
Data Model Properties 5-21
Delivery Properties 5-23
Define Font Mappings 5-23
Make Fonts Available for Publishing 5-23
Set Font Mapping at the Site Level or Report Level 5-24
Create a Font Map 5-24
Predefined Fonts 5-24
Define Currency Formats 5-26
Understand Currency Formats 5-26
6 Secure Reports
Use Digital Signature in a PDF Document 6-1
Prerequisites and Limitations 6-1
Obtain Digital Certificates 6-1
Create PFX Files 6-2
Apply a Digital Signature 6-2
Register Your Digital Signature and Assign Authorized Roles 6-2
Specify the Signature Display Field or Location 6-3
Specify a Template Field in a PDF Template for the Digital Signature 6-3
Specify the Location for the Digital Signature in the Report Properties 6-3
Run and Sign Reports with a Digital Signature 6-4
Use PGP Keys for Encrypted Report Delivery 6-4
Manage PGP Keys 6-4
Encrypt Data Files 6-5
v
Upload the Translated XLIFF File to Publisher 8-3
Use a Localized Template 8-3
Design the Localized Template File 8-3
Upload the Localized Template to Publisher 8-3
vi
Preface
Learn to administer Publisher for pixel-perfect reporting.
Topics:
• Audience
• Documentation Accessibility
• Diversity and Inclusion
• Related Resources
• Conventions
Audience
This document is intended for system administrators who are responsible for configuring
Publisher.
Documentation Accessibility
For information about Oracle's commitment to accessibility, visit the Oracle Accessibility
Program website at http://www.oracle.com/pls/topic/lookup?ctx=acc&id=docacc.
Related Resources
For a full list of guides, refer to the Books tab on Oracle Transactional Business Intelligence
Help Center.
vii
Preface
Conventions
The following text conventions are used in this document:
Convention Meaning
boldface Boldface type indicates graphical user interface elements associated
with an action, or terms defined in text or the glossary.
italic Italic type indicates book titles, emphasis, or placeholder variables for
which you supply particular values.
monospace Monospace type indicates commands within a paragraph, URLs, code
in examples, text that appears on the screen, or text that you enter.
viii
1
Introduction to Publisher Administration
This topic describes the tasks required to administer Publisher.
Topics:
• Introduction
• About the Administration Page
• About the Data Source Connections
• About Report Delivery Destinations
• About Setting Runtime Configuration Properties
Introduction
You can author, manage, and deliver pixel-perfect reports such as operational reports,
electronic funds transfer documents, government PDF forms, shipping labels, checks, sales
and marketing letters.
The administrator sets up and maintains the following system components.
• Data source connections
• Report delivery destinations
• Runtime configuration settings
For other business roles, see the guides that are outlined in the table below for information
about using the product.
1-1
Chapter 1
About Report Delivery Destinations
1-2
Chapter 1
About the Administration Page
1. To access the Publisher administration page from Oracle Applications Cloud, navigate to
the Oracle Transactional Business Intelligence home page.
a. Select Tools from the navigator, and then click Reports and Analytics.
b. Navigate to the Oracle Transactional Business Intelligence home page, click My
Profile (user profile icon), and then click Administration.
c. In the administration page, click Manage Publisher.
2. To directly access the Publisher administration page, use the /xmlpserver URL.
a. Log in to Publisher using the http://hostname.com:port/xmlpserver URL.
b. On the Publisher home page, click My Profile (user profile icon), and then click
Administration.
1-3
2
Configure System Maintenance Properties
This topic describes how to configure Publisher maintenance properties.
Topics:
• Set Report Viewer Properties
• Clear Report Objects from the Server Cache
• Clear the Subject Area Metadata Cache
• Purge Job Diagnostic Logs
• Purge Job History
• Upload and Manage Configuration-Specific Files
Scheduler Diagnostics
The Scheduler diagnostics page provides the runtime status of the scheduler. It provides
status of its JMS configuration, JMS queues, Cluster instance status, Scheduler Database
status, Toplink status, and Scheduler (Quartz) status.
The Diagnostics page displays how many scheduled report requests have been received by
the JMS queues, how many of them have failed and how many are still running. The JMS
status can be viewed at the cluster-instance level enabling you to decide whether to add
more instances to scale up by one or more of these JMS processors.
For example, if there're too many requests queued up for the e-mail processor in one
instance, you can consider adding another instance and enabling it to handle e-mail
processing. Similarly, if there're very large reports being processed and showing in the Report
Process queue in running status, then you can add another instance to scale up the Report
Process capability.
Also, the Scheduler Diagnostics page reflects the status of each component to show if any
component is down. You can see the connection string or JNDI name to the database, which
2-1
Chapter 2
Scheduler Diagnostics
cluster instance associates to which managed server instance, Toplink connection pool
configuration, and so on.
If an instance shows a failed status, then you can recover the instance and with the
failover mechanism of the JMS set up in the cluster, no jobs submitted are lost. When
the server instance is brought back, it is immediately available in the cluster for
service. The instance removal and addition reflects dynamically on the diagnostic
page.
When an instance is added to the cluster, the Scheduler Diagnostics page immediately
recognizes the new instance and displays the status of the new instances and all the
threads running on that instance. This provides a powerful monitoring capability to the
administrator to trace and resolve issues in any instance or any component of the
scheduler.
The Scheduler Diagnostics page provides information on the following components:
• JMS
• Cluster
• Database
• Scheduler Engine
The JMS section provides information on the following:
• JMS Cluster Config: This section provides configuration information for JMS setup:
– Provider type (Weblogic / ActiveMQ)
– WebLogic version
– WebLogic JNDI Factory
– JNDI URL for JMS
– Queue names
– Temporary directory
• JMS Runtime: This provides runtime status of all JMS queues and topics, as
shown in the table below.
The Cluster section provides details on the cluster instance, as shown in the figure
below. Use this information to understand the load on each processor.
2-2
Chapter 2
Scheduler Diagnostics
2-3
Chapter 2
Set Report Viewer Properties
The Quartz section provides information on these components, as shown in the figure
below.
• Quartz Configuration
• Quartz Initialization
2-4
Chapter 2
Clear Report Objects from the Server Cache
Enable Diagnostics
This topic describes tasks performed by administrators and BI Authors to enable the
diagnostics logs.
Topics:
• Enable Diagnostics for Scheduler Jobs
• Enable Diagnostics for Online Reports
2-5
Chapter 2
Enable Diagnostics
• Select Enable SQL Explain Plan to generate a diagnostic log with Explain
plan/SQL monitor report information.
• Select Enable Data Engine Diagnostic to generate a data processor log.
• Select Enable Report Processor Diagnostic to generate FO (Formatting
Options) and server related log information.
• Select Enable Consolidated Job Diagnostic to generate the entire log,
which includes scheduler log, data processor log, FO and server log details.
4. Submit the report.
5. After the report job runs, in the Report Job History page, select your report to view
the details.
6. Under Output & Delivery, click Diagnostic Log to download the job diagnostic log
and view the details.
Use the Manage Job Diagnostics Log page to purge the old job diagnostic logs.
2-6
Chapter 2
Purge Job Diagnostic Logs
2-7
3
Set Up Data Sources
This topic describes how to set up data sources for Publisher.
Topics:
• Set Up a JNDI Connection to Access Audit Data
• Set Up a Connection to a Web Service
• Set Up a Connection to an HTTP Data Source
• Set Up a Connection to a Content Server
• View or Update a Data Source
3-1
Chapter 3
About Proxy Authentication
• A report designer must have access to the data source to create or edit a data
model against the data source.
By default, a role with administrator privileges can access all data sources.
The configuration page for the data source includes a Security region that lists all the
available roles. You can grant roles access from this page, or you can also assign the
data sources to roles from the roles and permissions page.
3-2
Chapter 3
Set Up a Connection to an HTTP Data Source
To call this function every time a connection is made to the database, enter the following in
the Pre Process Function field: set_per_process_username(:xdo_user_name)
Another sample usage might be to insert a row to the LOGTAB table every time a user
connects or disconnects:
3-3
Chapter 3
Set Up a Connection to a Content Server
8. Optional: From the SSL Certificate list, select the SSL certificate you want to use
for the data source.
9. If you're using a proxy-enabled server, select Use System Proxy.
10. Define security for this data source connection. Move roles from the Available
Roles list to the Allowed Roles list. Only users assigned the roles in the Allowed
Roles list can create or view reports from this data source.
3-4
Chapter 3
View or Update a Data Source
• 2002 — Enables the "WS-Security" Username Token with the 2002 namespace:
http://docs.oasis-open.org/wss/2002/01/oasis-200201-wss-
wssecurity-secext-1.0.xsd
• 2004 — Enables the "WS-Security" Username Token with the 2004 namespace:
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-
username-token-profile-1.0#PasswordText
9. Optional: Enter the user name and password for the web service data source.
10. Optional: From the SSL Certificate list, select the SSL certificate you want to use for the
connection.
11. If you're using a proxy-enabled server, select Use System Proxy.
13. Define security for this data source connection. Move roles from the Available Roles list
to the Allowed Roles list. Only users assigned the roles in the Allowed Roles list can
create or view reports from this data source.
14. Click Apply.
3-5
4
Set Up Delivery Destinations
This topic describes the setup required to deliver Publisher reports. It also describes how to
set up the HTTP notification server.
Topics:
• Configure Delivery Options
• Add a Printer
• Add a Fax Server
• Add an Email Server
• Add a WebDAV Server
• Add an HTTP or HTTPS Server
• Add an FTP or SFTP Server
• Add a Content Server
4-1
Chapter 4
Add a Printer
• Contents servers and email servers don't support connection over a proxy,
regardless of this setting.
You can override the proxy settings per delivery server, using proxy configuration
fields on the individual server setup page. If a proxy server and ports are
configured for a delivery server, the Delivery Manager uses the proxy server and
port configured for the server instead of the one defined in the Java Runtime
environment. In Cloud installations, Use System Proxy Settings is always
selected, and cannot be turned off or overridden by individual server settings.
Add a Printer
You can set up a printer to print reports.
If you want to print checks on a remote printer, configure your print server with a SSL
certificate supported by Fusion Truststore. Ensure that your server presents the entire
certificate chain during the SSL handshake process. Test and verify that check printing
works. In case check printing fails, review the print server logs. If the failure occurs
during SSL handshake, then verify your print server configuration and make the
necessary corrections.
1. From the Administration page, under Delivery, select Printer, and then click Add
Server.
2. Enter the server name and URI of the printer.
3. Optional: If your printer or print server doesn't support printing PDF, enter a filter to
call a conversion utility to convert the PDF to a file format supported by your
specific printer type.
4. Enter the user name, password, authentication type (None, Basic, Digest), and
encryption Type (None, SSL).
5. Optional: Enter the host, port, user name, password, and authentication type
(None, Basic, Digest) of the proxy server.
6. Optional: In the Access Control section, deselect Public.
7. From the Available Roles list, select one or more roles you want to provide
access to the delivery channel, and click Move to add them to the Allowed Roles
list.
8. Click Apply.
4-2
Chapter 4
Add an Email Server
5. Optional: Enter the host, port, user name, password, and authentication type (None,
Basic, Digest) of the proxy server.
6. Optional: In the Access Control section, deselect Public.
7. From the Available Roles list, select one or more roles you want to provide access to the
delivery channel, and click Move to add them to the Allowed Roles list.
8. Click Apply.
4-3
Chapter 4
Add an HTTP or HTTPS Server
4-4
Chapter 4
Add an FTP or SFTP Server
6. Select Create files with Part extension when copy is in process to create a file on the
FTP server with a .part extension while the file is transferring.
When the file transfer is complete, the file is renamed without the .part extension. If the
file transfer doesn't complete, the file with the .part extension remains on the server.
7. Optional: Enter the security information.
a. If your server is password protected, enter the User name and Password.
b. Select the Authentication Type: Private Key or Password
c. Depending on the authentication type selection, select the private key file or specify
the private password.
If you selected Private Key as the authentication type, make sure you upload the
SSH Private Key file in the Upload Center.
8. Optional: Enter the host, port, user name, password, and authentication type (None,
Basic, Digest) of the proxy server.
9. Optional: To deliver PGP encrypted documents to the FTP server:
a. From the PGP Key list, select the PGP keys you uploaded in Security Center.
This step updates the filter command in the Filter Command field.
b. To sign the encrypted document, select Sign Output.
This step adds a -s parameter to the existing filter command in the Filter Command
field.
c. If you want to deliver PGP encrypted document in ASCII armored format, select
ASCII Armored Output.
This step adds a -a parameter to the existing filter command in the Filter Command
field.
10. In the Access Control section, deselect Public.
11. From the Available Roles list, select one or more roles you want to provide access to the
delivery channel, and click Move to add them to the Allowed Roles list.
12. Click Test Connection.
4-5
Chapter 4
Add a Content Server
4-6
Chapter 4
Add a Content Server
1. From the Administration page, under Delivery, select Content Server, and then click
Add Server.
2. Enter the Server Name, for example: contentserver01.
3. Enter the connection URI for your content server. The URI can take any of the following
supported protocols:
• HTTP/HTTPS — Specifies the URL to the Content Server CGI path.
For example:
– http://localhost:16200/cs/idcplg
– https://localhost:16200/cs/idcplg
• Intradoc — The Intradoc protocol communicates to the content server over the
Intradoc socket port (typically 4444). The IDC protocol also supports communication
over SSL. For example:
– idc://host:4444
– idcs://host:4443
• JAX-WS — Uses the JAX-WS protocol to connect to the content server.
For example:
– http://wlsserver:16200/idcnativews
4. Optional: Enter the user name and password of the content server.
5. Optional: To deliver PGP encrypted documents to the content server:
a. From the PGP Key list, select the PGP keys you uploaded in Security Center.
This step updates the filter command in the Filter Command field.
b. To sign the encrypted document, select Sign Output.
This step adds a -s parameter to the existing filter command in the Filter Command
field.
c. If you want to deliver PGP encrypted document in ASCII armored format, select
ASCII Armored Output.
This step adds a -a parameter to the existing filter command in the Filter Command
field.
6. In the Access Control section, deselect Public.
7. From the Available Roles list, select one or more roles you want to provide access to the
delivery channel, and click Move to add them to the Allowed Roles list.
8. Click Test Connection.
9. Click Apply.
4-7
Chapter 4
Add a Content Server
4-8
5
Define Runtime Configurations
This topic describes processing properties for PDF document security, FO processing, PDF
accessibility, and specific properties for each output type.
Topics:
• Set Runtime Properties
• PDF Output Properties
• PDF Digital Signature Properties
• PDF Accessibility Properties
• PDF/A Output Properties
• PDF/X Output Properties
• DOCX Output Properties
• RTF Output Properties
• PPTX Output Properties
• HTML Output Properties
• FO Processing Properties
• RTF Template Properties
• XPT Template Properties
• PDF Template Properties
• Excel Template Properties
• CSV Output Properties
• Excel Output Properties
• EText Output Properties
• All Outputs Properties
• Memory Guard Properties
• Data Model Properties
• Delivery Properties
• Define Font Mappings
• Define Currency Formats
5-1
Chapter 5
PDF Output Properties
These same properties can also be set at the report level, from the report editor's
Properties dialog. If different values are set for a property at each level, then report
level takes precedence.
5-2
Chapter 5
PDF Output Properties
5-3
Chapter 5
PDF Output Properties
5-4
Chapter 5
PDF Digital Signature Properties
5-5
Chapter 5
PDF Digital Signature Properties
• (PDF only) Place the digital signature in a specific field by setting the Existing
signature field name property.
• (RTF and PDF) Place the digital signature in a general location of the page (top
left, top center, or top right) by setting the Signature field location property.
• (RTF and PDF) Place the digital signature in a specific location designated by x
and y coordinates by setting the Signature field x coordinate and Signature
field y coordinate properties.
If you choose this option, you can also set Signature field width and Signature
field height to define the size of the field in your document.
5-6
Chapter 5
PDF Accessibility Properties
5-7
Chapter 5
PDF/X Output Properties
5-8
Chapter 5
PDF/X Output Properties
5-9
Chapter 5
DOCX Output Properties
5-10
Chapter 5
PPTX Output Properties
5-11
Chapter 5
HTML Output Properties
5-12
Chapter 5
FO Processing Properties
FO Processing Properties
The table below describes the properties that control FO processing.
5-13
Chapter 5
FO Processing Properties
5-14
Chapter 5
RTF Template Properties
5-15
Chapter 5
XPT Template Properties
5-16
Chapter 5
PDF Template Properties
5-17
Chapter 5
CSV Output Properties
5-18
Chapter 5
Excel Output Properties
5-19
Chapter 5
EText Output Properties
5-20
Chapter 5
Data Model Properties
5-21
Chapter 5
Data Model Properties
5-22
Chapter 5
Delivery Properties
Delivery Properties
The properties in the table below apply to report delivery.
5-23
Chapter 5
Define Font Mappings
Predefined Fonts
The following Type1 fonts are built-in to Adobe Acrobat and by default the mappings
for these fonts are available for publishing.
You can select any of these fonts as a target font with no additional setup required.
The Type1 fonts are listed in the table below.
5-24
Chapter 5
Define Font Mappings
The TrueType fonts are listed in the table below. All TrueType fonts are subset and
embedded into PDF.
Number Font Family Style Weight Actual Font Actual Font Type
Name
1 Albany WT normal normal ALBANYWT.ttf TrueType (Latin1
only)
2 Albany WT J normal normal ALBANWTJ.ttf TrueType (Japanese
flavor)
3 Albany WT K normal normal ALBANWTK.ttf TrueType (Korean
flavor)
4 Albany WT SC normal normal ALBANWTS.ttf TrueType (Simplified
Chinese flavor)
5 Albany WT TC normal normal ALBANWTT.ttf TrueType (Traditional
Chinese flavor)
6 Andale Duospace normal normal ADUO.ttf TrueType (Latin1
WT only, Fixed width)
6 Andale Duospace bold bold ADUOB.ttf TrueType (Latin1
WT only, Fixed width)
5-25
Chapter 5
Define Currency Formats
Number Font Family Style Weight Actual Font Actual Font Type
Name
7 Andale Duospace normal normal ADUOJ.ttf TrueType (Japanese
WT J flavor, Fixed width)
7 Andale Duospace bold bold ADUOJB.ttf TrueType (Japanese
WT J flavor, Fixed width)
8 Andale Duospace normal normal ADUOK.ttf TrueType (Korean
WT K flavor, Fixed width)
8 Andale Duospace bold bold ADUOKB.ttf TrueType (Korean
WT K flavor, Fixed width)
9 Andale Duospace normal normal ADUOSC.ttf TrueType (Simplified
WT SC Chinese flavor,
Fixed width)
9 Andale Duospace bold bold ADUOSCB.ttf TrueType (Simplified
WT SC Chinese flavor,
Fixed width)
10 Andale Duospace normal normal ADUOTC.ttf TrueType (Traditional
WT TC Chinese flavor,
Fixed width)
10 Andale Duospace bold bold ADUOTCB.ttf TrueType (Traditional
WT TC Chinese flavor,
Fixed width)
5-26
Chapter 5
Define Currency Formats
5-27
6
Secure Reports
This topic describes how to secure pixel-perfect reporting.
Topics:
• Use Digital Signature in a PDF Document
• Use PGP Keys for Encrypted Report Delivery
6-1
Chapter 6
Use Digital Signature in a PDF Document
6-2
Chapter 6
Use Digital Signature in a PDF Document
3. Enable the Roles that must have the authority to sign documents with this digital
signature. Use the shuttle buttons to move Available Roles to the Allowed Roles list.
4. Click Apply.
Specify the Location for the Digital Signature in the Report Properties
When you specify a location in the document to place the digital signature, you can either
specify a general location (Top Left, Top Center, or Top Right) or you can specify x and y
coordinates in the document.
You can also specify the height and width of the field for the digital signature by using runtime
properties. You don't need to alter the template to include a digital signature.
To specify the location for the digital signature:
1. In the catalog, navigate to the report.
2. Click the Edit link for the report to open the report for editing.
3. Click Properties and then click the Formatting tab.
4. Scroll to the PDF Digital Signature group of properties.
5. Set Enable Digital Signature to True.
6. Specify the location in the document where you want the digital signature to appear by
setting the appropriate properties as follows (note that the signature is inserted on the
first page of the document only):
• Existing signature field name — Doesn't apply to this method.
• Signature field location — Provides a list containing the following values:
Top Left, Top Center, Top Right
Select one of these general locations and Publisher places the digital signature in the
output document sized and positioned appropriately.
If you set this property, then don't enter X and Y coordinates or width and height
properties.
6-3
Chapter 6
Use PGP Keys for Encrypted Report Delivery
• Signature field X coordinate — Using the left edge of the document as the
zero point of the X axis, enter the position in points to place the digital
signature from the left.
For example, to place the digital signature horizontally in the middle of an 8.5
inch by 11 inch document (that is, 612 points in width and 792 points in
height), enter 306.
• Signature field Y coordinate — Using the bottom edge of the document as
the zero point of the Y axis, enter the position in points to place digital
signature from the bottom.
For example, to place the digital signature vertically in the middle of an 8.5
inch by 11 inch document (that is, 612 points in width and 792 points in
height), enter 396.
• Signature field width — Enter in points the desired width of the inserted
digital signature field. This applies only if you're setting the X and Y
coordinates.
• Signature field height — Enter in points the desired height of the inserted
digital signature field. This applies only if you're setting the X and Y
coordinates.
6-4
Chapter 6
Encrypt Data Files
1. From the Administration page, under Security Center, select PGP Keys.
2. To upload PGP keys to keystore, click Choose File, select the PGP key file, and then
click Upload.
3. To delete the PGP keys you uploaded, in the PGP Keys table, click the delete icon
corresponding to the PGP keys.
4. To download the PGP public keys for signature verification, click the download icon
corresponding to the public key file.
Note:
You can set the password only once and the password you set can't be changed.
Note down the encryption password for future use because the password can't be
recovered.
1. From the Administration page, under Security Center, select File Data Encryption.
2. Select Enable File Data Encryption.
3. Enter the encryption password and click Apply.
6-5
7
View Audit Data of Publisher Catalog Objects
An administrator can enable or disable viewing of the audit data of Publisher catalog objects,
configure a connection to the audit data, and create reports to view the audit data.
Topics:
• About Viewing Audit Data of Publisher Catalog Objects
• Enable or Disable Viewing of Publisher Audit Data
• Specify the Data Source Connection for Publisher Audit Data
• View Publisher Audit Data
Note:
User session data (User Login and User Logout events) isn't included in the audit
data. Only the reporting activities performed in the host:port/xmlpserver Publisher
interface pages are included in the audit data. The reporting activities performed in
the host:port/analytics interface pages aren't included in the audit data.
7-1
Chapter 7
Specify the Data Source Connection for Publisher Audit Data
7-2
8
Add Translations for the Catalog and Reports
This topic describes how to export and import translation files both for the catalog and for
individual report layouts.
Topics:
• Introduction
• Template Translation
• Use a Localized Template
Introduction
Publisher supports two types of translation: Catalog Translation and Template (or layout)
Translation.
Catalog translation enables the extraction of translatable strings from all objects contained in
a selected catalog folder into a single translation file; this file can then be translated and
uploaded back to Publisher and assigned the appropriate language code.
Catalog translation extracts not only translatable strings from the report layouts, but also the
user interface strings that are displayed to users, such as catalog object descriptions, report
parameter names, and data display names.
Users viewing the catalog see the item translations appropriate for the UI Language they
selected in their My Account preferences. Users see report translations appropriate for the
Report Locale that they selected in their My Account preferences.
Template translation enables the extraction of the translatable strings from a single RTF-
based template (including sub templates and style templates) or a single Publisher layout
template (.xpt file). Use this option when you only need the final report documents translated.
For example, your enterprise requires translated invoices to send to German and Japanese
customers.
Template Translation
RTF and Publisher (.xpt) templates can be translated from the Properties page.
Template translation includes:
• RTF templates
• RTF sub templates
8-1
Chapter 8
Template Translation
• Style templates
• Publishertemplates (.xpt)
To access the Properties page, click the Properties link for the layout in the Report
Editor, as shown below.
From the Properties page you can generate an XLIFF file for a single template. Click
Extract Translation to generate the XLIFF file.
8-2
Chapter 8
Use a Localized Template
8-3
Chapter 8
Use a Localized Template
8-4
9
Frequently Asked Questions for Publisher
This section provides answers to frequently asked questions for configuring and managing
Publisher.
Topics:
• How do I configure a delivery channel for Publisher?
• How do I restrict access to delivery channels?
• How do I configure FTP and SFTP delivery retry?
• How can I enable the viewing of audit data in Publisher?
• How do I upload the configuration-specific files?
• How do I add a custom connection to Oracle WebCenter Content (UCM) for multiple
accounts?
• How do I disable caching for Publisher?
9-1
Chapter 9
Top FAQs to Configure and Manage Publisher
9-2